Open pre opened 3 months ago
A workaround with Portieris:
portieris
namespace (to allow Pods be recreated there even when signature verification fails after certificate rotation)I feel bad about the complexity of having a combination of both stakater/reloader and portieris be operational in order to not lock down the cluster due to a bug In Portieris that doesn't seem to get fixed.
Possible alternatives for Portieris
Kyverno
Connaisseur
sigstore/policy-controller
When cert-manager rotates the certificate, the new certificate is not loaded by Portieris.
As a result, Portieris keeps using the old certificate and eventually fails with "remote error: tls: bad certificate".
Portieris v0.13.12 is installed via Helm chart with
UseCertManager: true
in values.yaml.Logs
To debug the issue, I switched the mutation webhook to
failurePolicy: Ignore
and tried recreating the Pods. The logs below are about that:failurePolicy: Fail
, and then terminating these two functional Pods, the old Pod will become the leader.The only way to fix this issue has so far been to temporarily disable the admission webhook, and then recreate the Portieris Pods.
cert-manager
portieris
Deleting the two recently created functional Pods causes new image admission requests go to the old Pod portieris-86cf58bdbb-8gh2l.
The old Pod still fails with "remote error: tls: bad certificate".
Certificates
❯ kg certificate NAME READY SECRET AGE portieris-certs True portieris-certs 120d
❯ kg secret NAME TYPE DATA AGE portieris-certs kubernetes.io/tls 3 120d
Portieris' deployment has:
Error